IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
CredsleakerCredsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
KeydecoderKeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
KubestrikerA Blazing fast Security Auditing tool for Kubernetes
CameradarCameradar hacks its way into RTSP videosurveillance cameras
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
Can I Take Over Xyz"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Pwdb PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
HawkeyeHawkeye filesystem analysis tool
Qsfuzzqsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
BasecrackDecode All Bases - Base Scheme Decoder
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
MiniprintA medium interaction printer honeypot 🍯
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
YarYar is a tool for plunderin' organizations, users and/or repositories.
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
PwnshopExploit Development, Reverse Engineering & Cryptography
HacktheboxNotes Taken for HTB Machines & InfoSec Community.
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Slack WatchmanMonitoring your Slack workspaces for sensitive information
LinkfinderA python script that finds endpoints in JavaScript files
KarmaFind leaked emails with your passwords
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
NetpwnTool made to automate tasks of pentesting.
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
WincmdfuWindows one line commands that make life easier, shortcuts and command line fu.
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
BinsnitchDetect silent (unwanted) changes to files on your system
Breach.twA service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Oob ServerA Bind9 server for pentesters to use for Out-of-Band vulnerabilities
Chatterinternet monitoring osint telegram bot for windows
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
GoaltdnsA permutation generation tool written in golang
Mitmap📡 A python program to create a fake AP and sniff data.